{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:21:52Z","timestamp":1765887712822,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319229058"},{"type":"electronic","value":"9783319229065"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22906-5_9","type":"book-chapter","created":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T10:27:48Z","timestamp":1438684068000},"page":"113-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Designing Privacy-Aware Systems in the Cloud"],"prefix":"10.1007","author":[{"given":"Christos","family":"Kalloniatis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,5]]},"reference":[{"key":"9_CR1","unstructured":"Rainie, L, Kiesler, S., Kang, R, Madden, M: Anonymity, Privacy and Security Online, Carnegie Mellon University. http:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online\/. Accessed 19 April 2015"},{"key":"9_CR2","unstructured":"TRUSTe: US Consumer Confidence Privacy Report. http:\/\/www.truste.com\/us-consumer-confidence-index-2014\/. Accessed 19 April 2015"},{"issue":"3","key":"9_CR3","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1108\/09685220410542615","volume":"12","author":"S Gritzalis","year":"2004","unstructured":"Gritzalis, S.: Enhancing web privacy and anonymity in the digital era. Inf. Manage. Comput. Secur. 12(3), 255\u2013288 (2004). Emerald Group Publishing Limited","journal-title":"Inf. Manage. Comput. Secur."},{"key":"9_CR4","volume-title":"Privacy Enhancing Technologies, White paper for Decision Makers","author":"R Koorn","year":"2004","unstructured":"Koorn, R., van Gils, H., Hart, J., Overbeek, P., Tellegen, R.: Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Netherlands (2004)"},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Eng. J. 13(3), 241\u2013255 (2008)","journal-title":"Requirements Eng. J."},{"issue":"12","key":"9_CR6","first-page":"1608","volume":"18","author":"H Mouratidis","year":"2012","unstructured":"Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning security and privacy to support the development of secure information systems. J. Univ. Comput. Sci. 18(12), 1608\u20131627 (2012)","journal-title":"J. Univ. Comput. Sci."},{"key":"9_CR7","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, white paper, v.0.34. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml. Accessed 19 April 2015"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"9_CR9","volume-title":"Privacy in Cloud Computing","author":"ITU Technology Watch","year":"2012","unstructured":"ITU Technology Watch: Privacy in Cloud Computing. International Telecommuni cations Union, Geneva, Switzerland (2012)"},{"key":"9_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-38490-5_41","volume-title":"Advanced Information Systems Engineering Workshops","author":"V Manousakis","year":"2013","unstructured":"Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455\u2013465. Springer, Heidelberg (2013)"},{"key":"9_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-37437-1_7","volume-title":"Collaborative, Trusted and Privacy-Aware e\/m-Services","author":"C Kalloniatis","year":"2013","unstructured":"Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e\/m-Services. IFIP AICT, vol. 399, pp. 73\u201387. Springer, Heidelberg (2013)"},{"key":"9_CR12","unstructured":"CSA Threats: Top Threats to Cloud Computing Results update 2012, Cloud Se-curity Alliance, Seattle, WA, USA (2012)"},{"key":"9_CR13","volume-title":"Computer Communications and Networks","author":"S Pearson","year":"2013","unstructured":"Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Computer Communications and Networks. Springer-Verlag, London (2013)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.csi.2013.12.010","volume":"36","author":"C Kalloniatis","year":"2014","unstructured":"Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stan. Interfaces 36, 759\u2013775 (2014)","journal-title":"Comput. Stan. Interfaces"},{"key":"9_CR15","unstructured":"EU Draft: EU Directive for Security issues in Cloud Computing. European Commission, Brussels, Belgium"},{"key":"9_CR16","unstructured":"Article 29 Data Protection Working Party, Opinion 05\/2012 on Cloud Computing (2012). Accessed 09 December 2014"},{"key":"9_CR17","unstructured":"Microsoft Technical report: Privacy in the cloud computing era, a Microsoft perspective, Microsoft Corp, Redmond, USA, November 2009. Accessed 10 January 2015"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW 2009), pp. 91\u201396. ACM, New York (2009). doi: 10.1145\/1655008.1655021 http:\/\/doi.acm.org\/10.1145\/1655008.1655021","DOI":"10.1145\/1655008.1655021"},{"key":"9_CR19","volume-title":"Privacy: What Developers and IT Professionals Should Know","author":"JC Cannon","year":"2004","unstructured":"Cannon, J.C.: Privacy: What Developers and IT Professionals Should Know. Addison-Wesley, Reading (2004)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms","author":"S Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S.: IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms. LNCS, vol. 1958. Springer, Heidelberg (2001)"},{"key":"9_CR21","unstructured":"Kalloniatis, C., Kavakli, E., Kontellis, E.: PriS tool: a case tool for privacy-oriented RE. In: Doukidis, G., et al. (eds.) Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, Athens, Greece, pp. 913\u2013925 (e-version), September 2009"},{"key":"9_CR22","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: incorporating privacy requirements into the system design process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the 13th IEEE International Requirements Engineering Conference \u2013 SREIS 2005 Symposium on Requirements Engineering for Information Security, Paris, France. IEEE CPS Conference Publishing Services, August 2005"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, G.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Software Eng. Knowl. Eng. 17, 285\u2013309 (2007)","journal-title":"Int. J. Software Eng. Knowl. Eng."},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","volume":"15","author":"SH Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requirements Eng. J. 15, 63\u201393 (2010)","journal-title":"Requirements Eng. J."},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. J. 10, 34\u201344 (2005)","journal-title":"Requirements Eng. J."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Romanosky, S., Acquisti, A., Hong, J., Cranor, L.F., Friedman, B.: Privacy patterns for online interactions. In: Proceedings of the 2006 Conference on Pattern Languages of Programs (PloP 2006), Portland, Oregon, pp. 12:1\u201312:9. ACM, New York, 21\u201323 October 2006","DOI":"10.1145\/1415472.1415486"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1002\/spe.1131","volume":"43","author":"M Hafiz","year":"2013","unstructured":"Hafiz, M.: A Pattern Language for Developing Privacy Enhancing Technologies. Software Practice and Experience. 43, 769\u2013787 (2013)","journal-title":"Software Practice and Experience."},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-14192-8_23","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"S Islam","year":"2010","unstructured":"Islam, S., Mouratidis, H., Wagner, S.: Towards a framework to elicit and manage security and privacy requirements from laws and regulations. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol. 6182, pp. 255\u2013261. Springer, Heidelberg (2010)"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s00766-009-0089-5","volume":"15","author":"AK Massey","year":"2010","unstructured":"Massey, A.K., Otto, P.N., Hayward, L.J., Ant\u00f3n, A.I.: Evaluating existing secu-rity and privacy requirements for legal compliance. Requirements Eng. J. 15, 119\u2013137 (2010)","journal-title":"Requirements Eng. J."},{"key":"9_CR30","unstructured":"Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., Weippl, E.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of the 20th USENIX Conference on Security, San Fransisco, CA, p. 5. USENIX Association, Berkeley, 8\u201312 August 2011"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: Proceedings of the 2010 39th International Conference on Parallel Processing Workshop, San Diego, CA, pp. 275\u2013279. IEEE Computer Society, Washington, DC, 13-16 September 2010","DOI":"10.1109\/ICPPW.2010.45"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, Indiana, USA, pp. 693 \u2013 702. IEEE Computer Society, UK, 30 November\u20133 December 2010","DOI":"10.1109\/CloudCom.2010.66"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Islam, S., Mouratidis, H., Weippl, E.: A goal-driven risk management approach to support security and privacy analysis of cloud-based system. In: Security Engineering for Cloud Computing: Approaches and Tools. IGI global publication (2012)","DOI":"10.4018\/978-1-4666-2125-1.ch006"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22906-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T12:21:41Z","timestamp":1674908501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22906-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319229058","9783319229065"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22906-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}